/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Annotation of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.92 - (hide annotations)
Wed Dec 17 03:56:39 2025 UTC (2 months, 4 weeks ago) by sysadm
Branch: MAIN
Changes since 1.91: +18 -0 lines
Content type: text/x-csrc
Refine debug log

1 sysadm 1.76 /* SPDX-License-Identifier: GPL-3.0-or-later */
2     /*
3     * bbs_net
4     * - user interactive feature of site shuttle
5     *
6 sysadm 1.77 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 sysadm 1.76 */
8 sysadm 1.1
9 sysadm 1.81 #ifdef HAVE_CONFIG_H
10     #include "config.h"
11     #endif
12    
13 sysadm 1.1 #include "bbs.h"
14 sysadm 1.83 #include "bbs_net.h"
15 sysadm 1.1 #include "common.h"
16 sysadm 1.55 #include "io.h"
17 sysadm 1.15 #include "log.h"
18 sysadm 1.55 #include "login.h"
19     #include "menu.h"
20 sysadm 1.15 #include "screen.h"
21 sysadm 1.84 #include "str_process.h"
22 sysadm 1.55 #include <errno.h>
23     #include <fcntl.h>
24     #include <netdb.h>
25     #include <stdarg.h>
26 sysadm 1.1 #include <stdio.h>
27 sysadm 1.55 #include <stdlib.h>
28 sysadm 1.29 #include <string.h>
29     #include <time.h>
30     #include <unistd.h>
31 sysadm 1.55 #include <arpa/inet.h>
32 sysadm 1.84 #include <ctype.h>
33 sysadm 1.55 #include <libssh/libssh.h>
34     #include <libssh/server.h>
35     #include <libssh/callbacks.h>
36     #include <netinet/in.h>
37     #include <netinet/ip.h>
38 sysadm 1.29 #include <sys/select.h>
39 sysadm 1.1 #include <sys/ioctl.h>
40     #include <sys/socket.h>
41 sysadm 1.82
42     #ifdef HAVE_SYS_EPOLL_H
43 sysadm 1.38 #include <sys/epoll.h>
44 sysadm 1.82 #else
45     #include <poll.h>
46     #endif
47 sysadm 1.1
48 sysadm 1.80 static const char MENU_CONF_DELIM[] = " \t\r\n";
49 sysadm 1.26
50 sysadm 1.80 enum _bbs_net_constant_t
51     {
52     MAX_PROCESS_BAR_LEN = 30,
53     MAXSTATION = 26 * 2,
54     STATION_PER_LINE = 4,
55 sysadm 1.84 USERNAME_MAX_LEN = 20,
56     PASSWORD_MAX_LEN = 20,
57 sysadm 1.90 SSH_CONNECT_TIMEOUT = 5, // seconds
58 sysadm 1.80 };
59 sysadm 1.1
60     struct _bbsnet_conf
61     {
62 sysadm 1.86 char org_name[40];
63     char site_name[40];
64     char host_name[IP_ADDR_LEN];
65 sysadm 1.24 in_port_t port;
66 sysadm 1.84 int8_t use_ssh;
67 sysadm 1.79 char charset[CHARSET_MAX_LEN + 1];
68 sysadm 1.1 } bbsnet_conf[MAXSTATION];
69    
70 sysadm 1.74 static MENU_SET bbsnet_menu;
71 sysadm 1.1
72 sysadm 1.89 static void unload_bbsnet_conf(void);
73    
74 sysadm 1.74 static int load_bbsnet_conf(const char *file_config)
75 sysadm 1.1 {
76 sysadm 1.14 FILE *fp;
77     MENU *p_menu;
78 sysadm 1.41 MENU_ITEM *p_menu_item;
79     MENU_ITEM_ID menu_item_id;
80 sysadm 1.86 char line[LINE_BUFFER_LEN], *t1, *t2, *t3, *t4, *t5, *t6, *saveptr;
81 sysadm 1.89 int port;
82 sysadm 1.14
83 sysadm 1.89 unload_bbsnet_conf();
84 sysadm 1.14
85 sysadm 1.41 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
86     if (bbsnet_menu.p_menu_pool == NULL)
87     {
88     log_error("calloc(p_menu_pool) error\n");
89 sysadm 1.89 return -1;
90 sysadm 1.41 }
91     bbsnet_menu.menu_count = 1;
92    
93     bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
94     if (bbsnet_menu.p_menu_item_pool == NULL)
95     {
96     log_error("calloc(p_menu_item_pool) error\n");
97 sysadm 1.89 unload_bbsnet_conf();
98     return -1;
99 sysadm 1.41 }
100     bbsnet_menu.menu_item_count = MAXSTATION;
101    
102     p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
103 sysadm 1.40
104 sysadm 1.21 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
105     p_menu->name[sizeof(p_menu->name) - 1] = '\0';
106 sysadm 1.14 p_menu->title.show = 0;
107 sysadm 1.41 p_menu->screen_show = 0;
108 sysadm 1.1
109 sysadm 1.89 fp = fopen(file_config, "r");
110     if (fp == NULL)
111     {
112     unload_bbsnet_conf();
113     return -2;
114     }
115    
116 sysadm 1.41 menu_item_id = 0;
117 sysadm 1.86 while (fgets(line, sizeof(line), fp) && menu_item_id < MAXSTATION)
118 sysadm 1.14 {
119 sysadm 1.86 t1 = strtok_r(line, MENU_CONF_DELIM, &saveptr);
120 sysadm 1.26 t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
121     t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
122     t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
123 sysadm 1.60 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
124 sysadm 1.84 t6 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
125 sysadm 1.14
126 sysadm 1.84 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL ||
127 sysadm 1.86 t5 == NULL || t6 == NULL || line[0] == '#' || line[0] == '*')
128 sysadm 1.18 {
129 sysadm 1.14 continue;
130 sysadm 1.18 }
131    
132 sysadm 1.86 strncpy(bbsnet_conf[menu_item_id].site_name, t2, sizeof(bbsnet_conf[menu_item_id].site_name) - 1);
133     bbsnet_conf[menu_item_id].site_name[sizeof(bbsnet_conf[menu_item_id].site_name) - 1] = '\0';
134     strncpy(bbsnet_conf[menu_item_id].org_name, t1, sizeof(bbsnet_conf[menu_item_id].org_name) - 1);
135     bbsnet_conf[menu_item_id].org_name[sizeof(bbsnet_conf[menu_item_id].org_name) - 1] = '\0';
136     strncpy(bbsnet_conf[menu_item_id].host_name, t3, sizeof(bbsnet_conf[menu_item_id].host_name) - 1);
137     bbsnet_conf[menu_item_id].host_name[sizeof(bbsnet_conf[menu_item_id].host_name) - 1] = '\0';
138 sysadm 1.89 port = atoi(t4);
139     if (port <= 0 || port > 65535)
140     {
141     log_error("Invalid port value %d of menu item %d\n", port, menu_item_id);
142     fclose(fp);
143     unload_bbsnet_conf();
144     return -3;
145     }
146     bbsnet_conf[menu_item_id].port = (in_port_t)port;
147 sysadm 1.84 bbsnet_conf[menu_item_id].use_ssh = (toupper(t5[0]) == 'Y');
148     strncpy(bbsnet_conf[menu_item_id].charset, t6, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
149 sysadm 1.60 bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
150 sysadm 1.14
151 sysadm 1.41 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
152     if (p_menu_item == NULL)
153     {
154     log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
155 sysadm 1.89 fclose(fp);
156     unload_bbsnet_conf();
157     return -3;
158 sysadm 1.41 }
159 sysadm 1.14
160 sysadm 1.41 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
161     p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
162     snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
163     p_menu_item->submenu = 0;
164     p_menu_item->priv = 0;
165     p_menu_item->level = 0;
166     p_menu_item->name[0] =
167     (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
168     p_menu_item->name[1] = '\0';
169 sysadm 1.89 snprintf(p_menu_item->text, sizeof(p_menu_item->text), "\033[1;36m%c.\033[m %s",
170 sysadm 1.86 p_menu_item->name[0], bbsnet_conf[menu_item_id].site_name);
171 sysadm 1.41
172     p_menu->items[p_menu->item_count] = menu_item_id;
173     p_menu->item_count++;
174     menu_item_id++;
175     }
176    
177     bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
178     bbsnet_menu.menu_id_path[0] = 0;
179     bbsnet_menu.menu_item_pos[0] = 0;
180     bbsnet_menu.choose_step = 0;
181 sysadm 1.14
182 sysadm 1.41 fclose(fp);
183 sysadm 1.14
184     return 0;
185 sysadm 1.1 }
186    
187 sysadm 1.74 static void unload_bbsnet_conf(void)
188 sysadm 1.40 {
189 sysadm 1.41 bbsnet_menu.menu_count = 0;
190     bbsnet_menu.menu_item_count = 0;
191    
192 sysadm 1.89 if (bbsnet_menu.p_menu_pool)
193     {
194     free(bbsnet_menu.p_menu_pool);
195     bbsnet_menu.p_menu_pool = NULL;
196     }
197    
198     if (bbsnet_menu.p_menu_item_pool)
199     {
200     free(bbsnet_menu.p_menu_item_pool);
201     bbsnet_menu.p_menu_item_pool = NULL;
202     }
203 sysadm 1.40 }
204    
205 sysadm 1.74 static void process_bar(int n, int len)
206 sysadm 1.1 {
207 sysadm 1.27 char buf[LINE_BUFFER_LEN];
208     char buf2[LINE_BUFFER_LEN];
209    
210 sysadm 1.89 if (len <= 0)
211     {
212     len = 1;
213     }
214     else if (len > LINE_BUFFER_LEN)
215 sysadm 1.27 {
216     len = LINE_BUFFER_LEN - 1;
217     }
218     if (n < 0)
219     {
220     n = 0;
221     }
222     else if (n > len)
223     {
224     n = len;
225     }
226 sysadm 1.14
227 sysadm 1.84 moveto(4, 1);
228 sysadm 1.23 prints(" ------------------------------ \r\n");
229 sysadm 1.27 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
230 sysadm 1.75 memcpy(buf2, buf, (size_t)n);
231 sysadm 1.27 buf2[n] = '\0';
232     prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
233 sysadm 1.23 prints(" ------------------------------ \r\n");
234 sysadm 1.14 iflush();
235 sysadm 1.1 }
236    
237 sysadm 1.74 static int bbsnet_connect(int n)
238 sysadm 1.1 {
239 sysadm 1.89 int sock = -1;
240     int ret;
241     int loop;
242     int error;
243 sysadm 1.38 int sock_connected = 0;
244 sysadm 1.89 int flags_sock = -1;
245     int flags_stdin = -1;
246     int flags_stdout = -1;
247 sysadm 1.14 struct sockaddr_in sin;
248 sysadm 1.36 char input_buf[LINE_BUFFER_LEN];
249     char output_buf[LINE_BUFFER_LEN];
250     int input_buf_len = 0;
251     int output_buf_len = 0;
252     int input_buf_offset = 0;
253     int output_buf_offset = 0;
254 sysadm 1.60 char input_conv[LINE_BUFFER_LEN * 2];
255     char output_conv[LINE_BUFFER_LEN * 2];
256     int input_conv_len = 0;
257     int output_conv_len = 0;
258     int input_conv_offset = 0;
259     int output_conv_offset = 0;
260 sysadm 1.89 iconv_t input_cd = (iconv_t)(-1);
261     iconv_t output_cd = (iconv_t)(-1);
262     char tocode[CHARSET_MAX_LEN + 20];
263 sysadm 1.82
264     #ifdef HAVE_SYS_EPOLL_H
265 sysadm 1.38 struct epoll_event ev, events[MAX_EVENTS];
266 sysadm 1.89 int epollfd = -1;
267 sysadm 1.82 #else
268     struct pollfd pfds[3];
269     #endif
270    
271     int nfds;
272 sysadm 1.38 int stdin_read_wait = 0;
273     int stdout_write_wait = 0;
274     int sock_read_wait = 0;
275     int sock_write_wait = 0;
276 sysadm 1.26 struct hostent *p_host = NULL;
277 sysadm 1.31 int tos;
278 sysadm 1.26 char remote_addr[IP_ADDR_LEN];
279 sysadm 1.14 int remote_port;
280 sysadm 1.63 char local_addr[IP_ADDR_LEN];
281     int local_port;
282     socklen_t sock_len;
283 sysadm 1.90 time_t t_begin;
284 sysadm 1.56 time_t t_used = time(NULL);
285 sysadm 1.14 struct tm *tm_used;
286 sysadm 1.26 int ch;
287 sysadm 1.84 char remote_user[USERNAME_MAX_LEN + 1];
288     char remote_pass[PASSWORD_MAX_LEN + 1];
289     ssh_session session = NULL;
290     ssh_channel channel = NULL;
291     int ssh_process_config = 0;
292 sysadm 1.88 int ssh_log_level = SSH_LOG_NOLOG;
293 sysadm 1.14
294 sysadm 1.53 if (user_online_update("BBS_NET") < 0)
295     {
296     log_error("user_online_update(BBS_NET) error\n");
297     }
298    
299 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
300     {
301     clearscr();
302    
303     if (!SSH_v2)
304     {
305     moveto(1, 1);
306     prints("只有在以SSH方式登陆本站时,才能使用SSH站点穿梭。");
307     press_any_key();
308     return 0;
309     }
310    
311     moveto(1, 1);
312 sysadm 1.86 prints("通过SSH方式连接[%s]...", bbsnet_conf[n].site_name);
313 sysadm 1.84 moveto(2, 1);
314     prints("请输入用户名: ");
315     iflush();
316     if (str_input(remote_user, sizeof(remote_user), DOECHO) < 0)
317     {
318     return -1;
319     }
320     if (remote_user[0] == '\0')
321     {
322     return 0;
323     }
324    
325     moveto(3, 1);
326     prints("请输入密码: ");
327     iflush();
328     if (str_input(remote_pass, sizeof(remote_pass), NOECHO) < 0)
329     {
330     return -1;
331     }
332     if (remote_pass[0] == '\0')
333     {
334     return 0;
335     }
336     }
337    
338 sysadm 1.14 clearscr();
339    
340 sysadm 1.84 moveto(1, 1);
341 sysadm 1.57 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
342 sysadm 1.86 bbsnet_conf[n].site_name, bbsnet_conf[n].host_name);
343 sysadm 1.14 iflush();
344    
345 sysadm 1.86 p_host = gethostbyname(bbsnet_conf[n].host_name);
346 sysadm 1.14
347 sysadm 1.26 if (p_host == NULL)
348 sysadm 1.1 {
349 sysadm 1.57 prints("\033[1;31m查找主机名失败!\033[m\r\n");
350 sysadm 1.14 press_any_key();
351 sysadm 1.89 goto cleanup;
352 sysadm 1.1 }
353 sysadm 1.14
354     sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
355    
356     if (sock < 0)
357 sysadm 1.1 {
358 sysadm 1.57 prints("\033[1;31m无法创建socket!\033[m\r\n");
359 sysadm 1.14 press_any_key();
360 sysadm 1.89 goto cleanup;
361 sysadm 1.1 }
362    
363 sysadm 1.14 sin.sin_family = AF_INET;
364 sysadm 1.48 sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY);
365 sysadm 1.14 sin.sin_port = 0;
366    
367     if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
368     {
369 sysadm 1.31 log_error("Bind address %s:%u failed (%d)\n",
370     inet_ntoa(sin.sin_addr), ntohs(sin.sin_port), errno);
371 sysadm 1.89 goto cleanup;
372 sysadm 1.14 }
373 sysadm 1.1
374 sysadm 1.49 memset(&sin, 0, sizeof(sin));
375 sysadm 1.14 sin.sin_family = AF_INET;
376 sysadm 1.26 sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0];
377 sysadm 1.14 sin.sin_port = htons(bbsnet_conf[n].port);
378    
379 sysadm 1.21 strncpy(remote_addr, inet_ntoa(sin.sin_addr), sizeof(remote_addr) - 1);
380     remote_addr[sizeof(remote_addr) - 1] = '\0';
381 sysadm 1.14 remote_port = ntohs(sin.sin_port);
382    
383 sysadm 1.57 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
384 sysadm 1.14 process_bar(0, MAX_PROCESS_BAR_LEN);
385 sysadm 1.29
386 sysadm 1.39 // Set socket as non-blocking
387 sysadm 1.89 if ((flags_sock = fcntl(sock, F_GETFL, 0)) == -1)
388     {
389     log_error("fcntl(F_GETFL) error (%d)\n", errno);
390     goto cleanup;
391     }
392     if ((fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK)) == -1)
393     {
394     log_error("fcntl(F_SETFL) error (%d)\n", errno);
395     goto cleanup;
396     }
397 sysadm 1.39
398     // Set STDIN/STDOUT as non-blocking
399 sysadm 1.89 if ((flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0)) == -1)
400     {
401     log_error("fcntl(F_GETFL) error (%d)\n", errno);
402     goto cleanup;
403     }
404     if ((flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0)) == -1)
405     {
406     log_error("fcntl(F_GETFL) error (%d)\n", errno);
407     goto cleanup;
408     }
409     if ((fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK)) == -1)
410     {
411     log_error("fcntl(F_SETFL) error (%d)\n", errno);
412     goto cleanup;
413     }
414     if ((fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK)) == -1)
415     {
416     log_error("fcntl(F_SETFL) error (%d)\n", errno);
417     goto cleanup;
418     }
419 sysadm 1.39
420 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
421 sysadm 1.38 epollfd = epoll_create1(0);
422     if (epollfd < 0)
423     {
424     log_error("epoll_create1() error (%d)\n", errno);
425 sysadm 1.89 goto cleanup;
426 sysadm 1.38 }
427    
428 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
429 sysadm 1.38 ev.data.fd = sock;
430     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
431     {
432     log_error("epoll_ctl(socket) error (%d)\n", errno);
433 sysadm 1.39 goto cleanup;
434 sysadm 1.38 }
435    
436 sysadm 1.59 ev.events = EPOLLIN | EPOLLET;
437 sysadm 1.38 ev.data.fd = STDIN_FILENO;
438     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
439     {
440     log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
441 sysadm 1.39 goto cleanup;
442 sysadm 1.38 }
443 sysadm 1.82 #endif
444 sysadm 1.38
445     while (!SYS_server_exit)
446 sysadm 1.29 {
447 sysadm 1.38 if ((ret = connect(sock, (struct sockaddr *)&sin, sizeof(sin))) < 0)
448 sysadm 1.29 {
449 sysadm 1.38 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
450     {
451     // Use select / epoll to check writability of the socket,
452     // then use getsockopt to check the status of the socket.
453     // See man connect(2)
454     break;
455     }
456     else if (errno == EINTR)
457     {
458     continue;
459     }
460     else
461     {
462     log_error("connect(socket) error (%d)\n", errno);
463 sysadm 1.39
464 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
465 sysadm 1.38 press_any_key();
466 sysadm 1.39
467     goto cleanup;
468 sysadm 1.38 }
469 sysadm 1.29 }
470     }
471    
472 sysadm 1.38 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
473 sysadm 1.1 {
474 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
475 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
476 sysadm 1.82 ret = nfds;
477     #else
478     pfds[0].fd = sock;
479     pfds[0].events = POLLOUT;
480     pfds[1].fd = STDIN_FILENO;
481     pfds[1].events = POLLIN;
482     nfds = 2;
483     ret = poll(pfds, (nfds_t)nfds, 500); // 0.5 second
484     #endif
485 sysadm 1.29
486 sysadm 1.82 if (ret < 0)
487 sysadm 1.20 {
488 sysadm 1.29 if (errno != EINTR)
489     {
490 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
491 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
492 sysadm 1.82 #else
493     log_error("poll() error (%d)\n", errno);
494     #endif
495 sysadm 1.39 break;
496 sysadm 1.29 }
497 sysadm 1.20 }
498 sysadm 1.82 else if (ret == 0) // timeout
499 sysadm 1.38 {
500     process_bar(j + 1, MAX_PROCESS_BAR_LEN);
501     }
502     else // ret > 0
503 sysadm 1.14 {
504 sysadm 1.38 for (int i = 0; i < nfds; i++)
505 sysadm 1.29 {
506 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
507 sysadm 1.38 if (events[i].data.fd == sock)
508 sysadm 1.82 #else
509     if (pfds[i].fd == sock && (pfds[i].revents & POLLOUT))
510     #endif
511 sysadm 1.38 {
512 sysadm 1.89 socklen_t len = sizeof(error);
513     if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, &len) < 0)
514 sysadm 1.38 {
515 sysadm 1.89 log_error("getsockopt() error (%d) !\n", errno);
516 sysadm 1.39 goto cleanup;
517 sysadm 1.38 }
518     if (error == 0)
519     {
520     sock_connected = 1;
521     }
522     }
523 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
524 sysadm 1.38 else if (events[i].data.fd == STDIN_FILENO)
525 sysadm 1.82 #else
526     else if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
527     #endif
528 sysadm 1.38 {
529 sysadm 1.84 do
530     {
531     ch = igetch(0);
532     } while (ch == 0);
533 sysadm 1.45 if (ch == Ctrl('C') || ch == KEY_ESC)
534 sysadm 1.38 {
535 sysadm 1.39 goto cleanup;
536 sysadm 1.38 }
537     }
538 sysadm 1.29 }
539 sysadm 1.14 }
540 sysadm 1.12 }
541 sysadm 1.38 if (SYS_server_exit)
542     {
543 sysadm 1.39 goto cleanup;
544 sysadm 1.38 }
545     if (!sock_connected)
546 sysadm 1.12 {
547 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
548 sysadm 1.14 press_any_key();
549 sysadm 1.39
550     goto cleanup;
551 sysadm 1.12 }
552 sysadm 1.29
553 sysadm 1.31 tos = IPTOS_LOWDELAY;
554     if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
555     {
556     log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
557     }
558 sysadm 1.14
559 sysadm 1.63 sock_len = sizeof(sin);
560     if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
561     {
562     log_error("getsockname() error: %d", errno);
563     goto cleanup;
564     }
565    
566     strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
567     local_addr[sizeof(local_addr) - 1] = '\0';
568     local_port = ntohs(sin.sin_port);
569    
570 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
571     {
572     session = ssh_new();
573     if (session == NULL)
574     {
575     log_error("ssh_new() error\n");
576     goto cleanup;
577     }
578    
579     if (ssh_options_set(session, SSH_OPTIONS_FD, &sock) < 0 ||
580     ssh_options_set(session, SSH_OPTIONS_PROCESS_CONFIG, &ssh_process_config) < 0 ||
581 sysadm 1.85 ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, SSH_KNOWN_HOSTS_FILE) < 0 ||
582 sysadm 1.86 ssh_options_set(session, SSH_OPTIONS_HOST, bbsnet_conf[n].host_name) < 0 ||
583 sysadm 1.84 ssh_options_set(session, SSH_OPTIONS_USER, remote_user) < 0 ||
584     ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "+ssh-rsa") < 0 ||
585     ssh_options_set(session, SSH_OPTIONS_LOG_VERBOSITY, &ssh_log_level) < 0)
586     {
587     log_error("Error setting SSH options: %s\n", ssh_get_error(session));
588     goto cleanup;
589     }
590    
591 sysadm 1.90 ssh_set_blocking(session, 0);
592 sysadm 1.85
593 sysadm 1.90 t_begin = time(NULL);
594     ret = SSH_ERROR;
595     while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
596 sysadm 1.84 {
597     ret = ssh_connect(session);
598     if (ret == SSH_OK)
599     {
600     break;
601     }
602 sysadm 1.90 else if (ret == SSH_AGAIN)
603     {
604     // log_error("ssh_connect() error: SSH_AGAIN\n");
605     }
606     else // if (ret == SSH_ERROR)
607 sysadm 1.84 {
608 sysadm 1.90 log_error("ssh_connect() error: SSH_ERROR\n");
609 sysadm 1.84 goto cleanup;
610     }
611     }
612 sysadm 1.90 if (ret != SSH_OK)
613     {
614     prints("\033[1;31m连接超时!\033[m\r\n");
615     press_any_key();
616     goto cleanup;
617     }
618 sysadm 1.84
619 sysadm 1.85 ret = ssh_session_is_known_server(session);
620     switch (ret)
621     {
622     case SSH_KNOWN_HOSTS_NOT_FOUND:
623     case SSH_KNOWN_HOSTS_UNKNOWN:
624     if (ssh_session_update_known_hosts(session) != SSH_OK)
625     {
626 sysadm 1.86 log_error("ssh_session_update_known_hosts(%s) error\n", bbsnet_conf[n].host_name);
627 sysadm 1.90 prints("\033[1;31m无法添加服务器证书\033[m\r\n");
628 sysadm 1.85 press_any_key();
629     goto cleanup;
630     }
631 sysadm 1.86 log_common("SSH key of (%s) is added into %s\n", bbsnet_conf[n].host_name, SSH_KNOWN_HOSTS_FILE);
632 sysadm 1.85 case SSH_KNOWN_HOSTS_OK:
633     break;
634     case SSH_KNOWN_HOSTS_CHANGED:
635     case SSH_KNOWN_HOSTS_OTHER:
636 sysadm 1.86 log_error("ssh_session_is_known_server(%s) error: %d\n", bbsnet_conf[n].host_name, ret);
637 sysadm 1.90 prints("\033[1;31m服务器证书已变更\033[m\r\n");
638 sysadm 1.85 press_any_key();
639     goto cleanup;
640     }
641 sysadm 1.84
642 sysadm 1.90 ret = SSH_AUTH_ERROR;
643     while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
644 sysadm 1.84 {
645     ret = ssh_userauth_password(session, NULL, remote_pass);
646     if (ret == SSH_AUTH_SUCCESS)
647     {
648     break;
649     }
650     else if (ret == SSH_AUTH_AGAIN)
651     {
652 sysadm 1.90 // log_error("ssh_userauth_password() error: SSH_AUTH_AGAIN\n");
653 sysadm 1.84 }
654     else if (ret == SSH_AUTH_ERROR)
655     {
656 sysadm 1.90 log_error("ssh_userauth_password() error: SSH_AUTH_ERROR\n");
657 sysadm 1.84 goto cleanup;
658     }
659     else // if (ret == SSH_AUTH_DENIED)
660     {
661 sysadm 1.90 log_error("ssh_userauth_password() error: SSH_AUTH_DENIED\n");
662 sysadm 1.84 prints("\033[1;31m身份验证失败!\033[m\r\n");
663 sysadm 1.90 press_any_key();
664     goto cleanup;
665 sysadm 1.84 }
666     }
667 sysadm 1.90 if (ret != SSH_AUTH_SUCCESS)
668     {
669     prints("\033[1;31m连接超时!\033[m\r\n");
670     press_any_key();
671     goto cleanup;
672     }
673 sysadm 1.84
674     channel = ssh_channel_new(session);
675     if (channel == NULL)
676     {
677     log_error("ssh_channel_new() error\n");
678     goto cleanup;
679     }
680    
681 sysadm 1.90 ret = SSH_ERROR;
682     while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
683 sysadm 1.84 {
684     ret = ssh_channel_open_session(channel);
685     if (ret == SSH_OK)
686     {
687     break;
688     }
689 sysadm 1.90 else if (ret == SSH_AGAIN)
690     {
691     // log_error("ssh_channel_open_session() error: SSH_AGAIN\n");
692     }
693     else // if (ret == SSH_ERROR)
694 sysadm 1.84 {
695 sysadm 1.90 log_error("ssh_channel_open_session() error: SSH_ERROR\n");
696 sysadm 1.84 goto cleanup;
697     }
698     }
699 sysadm 1.90 if (ret != SSH_OK)
700     {
701     prints("\033[1;31m连接超时!\033[m\r\n");
702     press_any_key();
703     goto cleanup;
704     }
705 sysadm 1.84
706 sysadm 1.90 ret = SSH_ERROR;
707     while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
708 sysadm 1.84 {
709     ret = ssh_channel_request_pty(channel);
710     if (ret == SSH_OK)
711     {
712     break;
713     }
714 sysadm 1.90 else if (ret == SSH_AGAIN)
715     {
716     // log_error("ssh_channel_request_pty() error: SSH_AGAIN\n");
717     }
718     else // if (ret == SSH_ERROR)
719 sysadm 1.84 {
720 sysadm 1.90 log_error("ssh_channel_request_pty() error: SSH_ERROR\n");
721 sysadm 1.84 goto cleanup;
722     }
723     }
724 sysadm 1.90 if (ret != SSH_OK)
725     {
726     prints("\033[1;31m连接超时!\033[m\r\n");
727     press_any_key();
728     goto cleanup;
729     }
730 sysadm 1.84
731 sysadm 1.90 ret = SSH_ERROR;
732     while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
733 sysadm 1.84 {
734     ret = ssh_channel_request_shell(channel);
735     if (ret == SSH_OK)
736     {
737     break;
738     }
739 sysadm 1.90 else if (ret == SSH_AGAIN)
740     {
741     // log_error("ssh_channel_request_shell() error: SSH_AGAIN\n");
742     }
743     else // if (ret == SSH_ERROR)
744 sysadm 1.84 {
745 sysadm 1.90 log_error("ssh_channel_request_shell() error: SSH_ERROR\n");
746 sysadm 1.84 goto cleanup;
747     }
748     }
749 sysadm 1.90 if (ret != SSH_OK)
750 sysadm 1.89 {
751 sysadm 1.90 prints("\033[1;31m连接超时!\033[m\r\n");
752     press_any_key();
753 sysadm 1.89 goto cleanup;
754     }
755 sysadm 1.84 }
756    
757 sysadm 1.57 prints("\033[1;31m连接成功!\033[m\r\n");
758 sysadm 1.33 iflush();
759 sysadm 1.63 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
760     remote_addr, remote_port, local_addr, local_port, BBS_username);
761 sysadm 1.14
762 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
763     (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
764 sysadm 1.68 input_cd = iconv_open(tocode, stdio_charset);
765 sysadm 1.60 if (input_cd == (iconv_t)(-1))
766     {
767 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", stdio_charset, tocode, errno);
768 sysadm 1.60 goto cleanup;
769     }
770 sysadm 1.68
771 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
772     (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
773 sysadm 1.70 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
774 sysadm 1.67 if (output_cd == (iconv_t)(-1))
775 sysadm 1.60 {
776 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, tocode, errno);
777 sysadm 1.60 goto cleanup;
778     }
779    
780 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
781 sysadm 1.38 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
782     ev.data.fd = sock;
783     if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
784     {
785     log_error("epoll_ctl(socket) error (%d)\n", errno);
786 sysadm 1.39 goto cleanup;
787 sysadm 1.38 }
788    
789 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
790 sysadm 1.38 ev.data.fd = STDOUT_FILENO;
791     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
792     {
793     log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
794 sysadm 1.39 goto cleanup;
795 sysadm 1.38 }
796 sysadm 1.82 #endif
797 sysadm 1.38
798 sysadm 1.50 BBS_last_access_tm = t_used = time(NULL);
799 sysadm 1.14 loop = 1;
800    
801 sysadm 1.26 while (loop && !SYS_server_exit)
802 sysadm 1.12 {
803 sysadm 1.47 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
804     {
805 sysadm 1.92 #ifdef _DEBUG
806 sysadm 1.47 log_error("SSH channel is closed\n");
807 sysadm 1.92 #endif
808 sysadm 1.47 loop = 0;
809     break;
810     }
811    
812 sysadm 1.84 if (bbsnet_conf[n].use_ssh && ssh_channel_is_closed(channel))
813     {
814 sysadm 1.92 #ifdef _DEBUG
815 sysadm 1.84 log_error("Remote SSH channel is closed\n");
816 sysadm 1.92 #endif
817 sysadm 1.84 loop = 0;
818     break;
819     }
820    
821 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
822 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
823 sysadm 1.82 ret = nfds;
824     #else
825     pfds[0].fd = STDIN_FILENO;
826     pfds[0].events = POLLIN;
827     pfds[1].fd = sock;
828     pfds[1].events = POLLIN | POLLOUT;
829     pfds[2].fd = STDOUT_FILENO;
830     pfds[2].events = POLLOUT;
831     nfds = 3;
832     ret = poll(pfds, (nfds_t)nfds, 100); // 0.1 second
833     #endif
834 sysadm 1.33
835 sysadm 1.82 if (ret < 0)
836 sysadm 1.14 {
837 sysadm 1.38 if (errno != EINTR)
838 sysadm 1.14 {
839 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
840 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
841 sysadm 1.82 #else
842     log_error("poll() error (%d)\n", errno);
843     #endif
844 sysadm 1.38 break;
845 sysadm 1.14 }
846 sysadm 1.38 continue;
847 sysadm 1.14 }
848 sysadm 1.82 else if (ret == 0) // timeout
849 sysadm 1.1 {
850 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
851 sysadm 1.28 {
852 sysadm 1.38 break;
853 sysadm 1.28 }
854 sysadm 1.1 }
855 sysadm 1.38
856     for (int i = 0; i < nfds; i++)
857 sysadm 1.1 {
858 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
859 sysadm 1.59 if (events[i].data.fd == STDIN_FILENO)
860 sysadm 1.82 #else
861     if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
862     #endif
863 sysadm 1.14 {
864 sysadm 1.38 stdin_read_wait = 1;
865 sysadm 1.59 }
866    
867 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
868 sysadm 1.59 if (events[i].data.fd == sock)
869 sysadm 1.82 #else
870     if (pfds[i].fd == sock)
871     #endif
872 sysadm 1.59 {
873 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
874 sysadm 1.59 if (events[i].events & EPOLLIN)
875 sysadm 1.82 #else
876     if (pfds[i].revents & POLLIN)
877     #endif
878 sysadm 1.59 {
879     sock_read_wait = 1;
880     }
881 sysadm 1.82
882     #ifdef HAVE_SYS_EPOLL_H
883 sysadm 1.59 if (events[i].events & EPOLLOUT)
884 sysadm 1.82 #else
885     if (pfds[i].revents & POLLOUT)
886     #endif
887 sysadm 1.59 {
888     sock_write_wait = 1;
889     }
890     }
891    
892 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
893 sysadm 1.59 if (events[i].data.fd == STDOUT_FILENO)
894 sysadm 1.82 #else
895     if (pfds[i].fd == STDOUT_FILENO && (pfds[i].revents & POLLOUT))
896 sysadm 1.84 #endif
897 sysadm 1.59 {
898     stdout_write_wait = 1;
899     }
900     }
901    
902     if (stdin_read_wait)
903     {
904     while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
905     {
906     if (SSH_v2)
907 sysadm 1.33 {
908 sysadm 1.59 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
909     if (ret == SSH_ERROR)
910 sysadm 1.47 {
911 sysadm 1.92 #ifdef _DEBUG
912 sysadm 1.59 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
913 sysadm 1.92 #endif
914 sysadm 1.59 loop = 0;
915     break;
916 sysadm 1.47 }
917 sysadm 1.59 else if (ret == SSH_EOF)
918 sysadm 1.47 {
919 sysadm 1.59 stdin_read_wait = 0;
920     loop = 0;
921     break;
922 sysadm 1.47 }
923 sysadm 1.59 else if (ret == 0)
924 sysadm 1.33 {
925 sysadm 1.72 // Send NO-OP to remote server
926     input_buf[input_buf_len] = '\0';
927     input_buf_len++;
928 sysadm 1.73 BBS_last_access_tm = time(NULL);
929 sysadm 1.72
930 sysadm 1.59 stdin_read_wait = 0;
931     break; // Check whether channel is still open
932 sysadm 1.38 }
933 sysadm 1.59 }
934     else
935     {
936     ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
937     }
938     if (ret < 0)
939     {
940     if (errno == EAGAIN || errno == EWOULDBLOCK)
941 sysadm 1.38 {
942     stdin_read_wait = 0;
943     break;
944     }
945 sysadm 1.59 else if (errno == EINTR)
946     {
947     continue;
948     }
949 sysadm 1.38 else
950     {
951 sysadm 1.59 log_error("read(STDIN) error (%d)\n", errno);
952     loop = 0;
953     break;
954     }
955     }
956     else if (ret == 0) // broken pipe
957     {
958     #ifdef _DEBUG
959     log_error("read(STDIN) EOF\n");
960     #endif
961     stdin_read_wait = 0;
962     loop = 0;
963     break;
964     }
965     else
966     {
967     input_buf_len += ret;
968     BBS_last_access_tm = time(NULL);
969 sysadm 1.58
970 sysadm 1.59 // Refresh current action while user input
971     if (user_online_update("BBS_NET") < 0)
972     {
973     log_error("user_online_update(BBS_NET) error\n");
974     }
975 sysadm 1.58
976 sysadm 1.59 continue;
977 sysadm 1.33 }
978 sysadm 1.36 }
979 sysadm 1.59 }
980 sysadm 1.29
981 sysadm 1.59 if (sock_write_wait)
982     {
983 sysadm 1.60 if (input_buf_offset < input_buf_len)
984 sysadm 1.36 {
985 sysadm 1.72 // For debug
986     #ifdef _DEBUG
987     for (int j = input_buf_offset; j < input_buf_len; j++)
988     {
989     log_error("Debug input: <--[%u]\n", (input_buf[j] + 256) % 256);
990     }
991     #endif
992    
993 sysadm 1.66 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
994 sysadm 1.60 if (ret < 0)
995     {
996 sysadm 1.66 log_error("io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
997 sysadm 1.71 input_buf_len = input_buf_offset; // Discard invalid sequence
998 sysadm 1.60 }
999 sysadm 1.72
1000     // For debug
1001     #ifdef _DEBUG
1002     for (int j = input_conv_offset; j < input_conv_len; j++)
1003     {
1004     log_error("Debug input_conv: <--[%u]\n", (input_conv[j] + 256) % 256);
1005     }
1006     #endif
1007 sysadm 1.60 }
1008    
1009     while (input_conv_offset < input_conv_len && !SYS_server_exit)
1010     {
1011 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
1012     {
1013     ret = ssh_channel_write(channel, input_conv + input_conv_offset, (uint32_t)(input_conv_len - input_conv_offset));
1014     if (ret == SSH_ERROR)
1015     {
1016 sysadm 1.92 #ifdef _DEBUG
1017 sysadm 1.84 log_error("ssh_channel_write() error: %s\n", ssh_get_error(session));
1018 sysadm 1.92 #endif
1019 sysadm 1.84 loop = 0;
1020     break;
1021     }
1022     }
1023     else
1024     {
1025     ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
1026     }
1027 sysadm 1.59 if (ret < 0)
1028 sysadm 1.36 {
1029 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
1030 sysadm 1.36 {
1031 sysadm 1.59 sock_write_wait = 0;
1032     break;
1033 sysadm 1.38 }
1034 sysadm 1.59 else if (errno == EINTR)
1035 sysadm 1.38 {
1036 sysadm 1.59 continue;
1037     }
1038     else
1039     {
1040 sysadm 1.92 #ifdef _DEBUG
1041 sysadm 1.59 log_error("write(socket) error (%d)\n", errno);
1042 sysadm 1.92 #endif
1043 sysadm 1.36 loop = 0;
1044 sysadm 1.38 break;
1045     }
1046 sysadm 1.59 }
1047     else if (ret == 0) // broken pipe
1048     {
1049     #ifdef _DEBUG
1050     log_error("write(socket) EOF\n");
1051     #endif
1052     sock_write_wait = 0;
1053     loop = 0;
1054     break;
1055     }
1056     else
1057     {
1058 sysadm 1.60 input_conv_offset += ret;
1059     if (input_conv_offset >= input_conv_len) // Output buffer complete
1060 sysadm 1.38 {
1061 sysadm 1.60 input_conv_offset = 0;
1062     input_conv_len = 0;
1063 sysadm 1.59 break;
1064 sysadm 1.36 }
1065 sysadm 1.59 continue;
1066 sysadm 1.36 }
1067 sysadm 1.14 }
1068 sysadm 1.59 }
1069 sysadm 1.36
1070 sysadm 1.59 if (sock_read_wait)
1071     {
1072     while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
1073 sysadm 1.14 {
1074 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
1075     {
1076     ret = ssh_channel_read_nonblocking(channel, output_buf + output_buf_len,
1077     (uint32_t)(sizeof(output_buf) - (size_t)output_buf_len), 0);
1078     if (ret == SSH_ERROR)
1079     {
1080 sysadm 1.92 #ifdef _DEBUG
1081 sysadm 1.84 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(session));
1082 sysadm 1.92 #endif
1083 sysadm 1.84 loop = 0;
1084     break;
1085     }
1086     else if (ret == SSH_EOF)
1087     {
1088     sock_read_wait = 0;
1089     loop = 0;
1090     break;
1091     }
1092     else if (ret == 0)
1093     {
1094     sock_read_wait = 0;
1095     break;
1096     }
1097     }
1098     else
1099     {
1100     ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
1101     }
1102 sysadm 1.59 if (ret < 0)
1103 sysadm 1.14 {
1104 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
1105 sysadm 1.38 {
1106 sysadm 1.59 sock_read_wait = 0;
1107     break;
1108 sysadm 1.38 }
1109 sysadm 1.59 else if (errno == EINTR)
1110 sysadm 1.33 {
1111 sysadm 1.59 continue;
1112 sysadm 1.38 }
1113     else
1114     {
1115 sysadm 1.92 #ifdef _DEBUG
1116 sysadm 1.59 log_error("read(socket) error (%d)\n", errno);
1117 sysadm 1.92 #endif
1118 sysadm 1.59 loop = 0;
1119     break;
1120 sysadm 1.33 }
1121     }
1122 sysadm 1.59 else if (ret == 0) // broken pipe
1123     {
1124     #ifdef _DEBUG
1125     log_error("read(socket) EOF\n");
1126     #endif
1127     sock_read_wait = 0;
1128     loop = 0;
1129     break;
1130     }
1131     else
1132     {
1133     output_buf_len += ret;
1134     continue;
1135     }
1136 sysadm 1.36 }
1137 sysadm 1.59 }
1138 sysadm 1.36
1139 sysadm 1.59 if (stdout_write_wait)
1140     {
1141 sysadm 1.60 if (output_buf_offset < output_buf_len)
1142     {
1143 sysadm 1.66 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
1144 sysadm 1.60 if (ret < 0)
1145     {
1146 sysadm 1.66 log_error("io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
1147 sysadm 1.71 output_buf_len = output_buf_offset; // Discard invalid sequence
1148 sysadm 1.60 }
1149     }
1150    
1151     while (output_conv_offset < output_conv_len && !SYS_server_exit)
1152 sysadm 1.36 {
1153 sysadm 1.59 if (SSH_v2)
1154 sysadm 1.36 {
1155 sysadm 1.60 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
1156 sysadm 1.59 if (ret == SSH_ERROR)
1157 sysadm 1.47 {
1158 sysadm 1.92 #ifdef _DEBUG
1159 sysadm 1.59 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
1160 sysadm 1.92 #endif
1161 sysadm 1.59 loop = 0;
1162     break;
1163 sysadm 1.47 }
1164 sysadm 1.59 }
1165     else
1166     {
1167 sysadm 1.60 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
1168 sysadm 1.59 }
1169     if (ret < 0)
1170     {
1171     if (errno == EAGAIN || errno == EWOULDBLOCK)
1172 sysadm 1.47 {
1173 sysadm 1.59 stdout_write_wait = 0;
1174     break;
1175 sysadm 1.47 }
1176 sysadm 1.59 else if (errno == EINTR)
1177 sysadm 1.38 {
1178 sysadm 1.59 continue;
1179 sysadm 1.38 }
1180 sysadm 1.59 else
1181 sysadm 1.33 {
1182 sysadm 1.92 #ifdef _DEBUG
1183 sysadm 1.59 log_error("write(STDOUT) error (%d)\n", errno);
1184 sysadm 1.92 #endif
1185 sysadm 1.36 loop = 0;
1186 sysadm 1.38 break;
1187     }
1188 sysadm 1.59 }
1189     else if (ret == 0) // broken pipe
1190     {
1191     #ifdef _DEBUG
1192     log_error("write(STDOUT) EOF\n");
1193     #endif
1194     stdout_write_wait = 0;
1195     loop = 0;
1196     break;
1197     }
1198     else
1199     {
1200 sysadm 1.60 output_conv_offset += ret;
1201     if (output_conv_offset >= output_conv_len) // Output buffer complete
1202 sysadm 1.38 {
1203 sysadm 1.60 output_conv_offset = 0;
1204     output_conv_len = 0;
1205 sysadm 1.59 break;
1206 sysadm 1.36 }
1207 sysadm 1.59 continue;
1208 sysadm 1.36 }
1209 sysadm 1.14 }
1210 sysadm 1.1 }
1211     }
1212    
1213 sysadm 1.89 cleanup:
1214     if (input_cd != (iconv_t)(-1))
1215     {
1216     iconv_close(input_cd);
1217     }
1218     if (output_cd != (iconv_t)(-1))
1219     {
1220     iconv_close(output_cd);
1221     }
1222 sysadm 1.60
1223 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1224 sysadm 1.89 if (epollfd != -1 && close(epollfd) < 0)
1225 sysadm 1.39 {
1226     log_error("close(epoll) error (%d)\n");
1227     }
1228 sysadm 1.82 #endif
1229 sysadm 1.39
1230 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
1231     {
1232 sysadm 1.89 if (channel != NULL)
1233     {
1234     ssh_channel_free(channel);
1235     }
1236     if (session != NULL)
1237     {
1238     ssh_disconnect(session);
1239     ssh_free(session);
1240     }
1241 sysadm 1.84 }
1242    
1243 sysadm 1.36 // Restore STDIN/STDOUT flags
1244 sysadm 1.90 if (flags_stdin != -1 && fcntl(STDIN_FILENO, F_SETFL, flags_stdin) == -1)
1245 sysadm 1.89 {
1246     log_error("fcntl(F_SETFL) error (%d)\n", errno);
1247     }
1248     if (flags_stdout != -1 && fcntl(STDOUT_FILENO, F_SETFL, flags_stdout) == -1)
1249     {
1250     log_error("fcntl(F_SETFL) error (%d)\n", errno);
1251     }
1252 sysadm 1.36
1253 sysadm 1.89 if (sock != -1 && close(sock) == -1)
1254 sysadm 1.14 {
1255     log_error("Close socket failed\n");
1256     }
1257 sysadm 1.1
1258 sysadm 1.50 t_used = time(NULL) - t_used;
1259 sysadm 1.14 tm_used = gmtime(&t_used);
1260 sysadm 1.8
1261 sysadm 1.46 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
1262 sysadm 1.90 tm_used->tm_yday, tm_used->tm_hour, tm_used->tm_min, tm_used->tm_sec);
1263 sysadm 1.8
1264 sysadm 1.72 BBS_last_access_tm = time(NULL);
1265    
1266 sysadm 1.14 return 0;
1267 sysadm 1.1 }
1268    
1269 sysadm 1.74 static int bbsnet_refresh()
1270 sysadm 1.1 {
1271 sysadm 1.14 clearscr();
1272 sysadm 1.84
1273     moveto(1, 1);
1274     prints(" ------------------------------------------------------------------------------ ");
1275 sysadm 1.20 for (int i = 2; i < 19; i++)
1276 sysadm 1.14 {
1277 sysadm 1.84 moveto(i, 1);
1278 sysadm 1.23 prints("|");
1279 sysadm 1.84 moveto(i, 80);
1280 sysadm 1.23 prints("|");
1281 sysadm 1.14 }
1282 sysadm 1.84 moveto(19, 1);
1283     prints("|------------------------------------------------------------------------------|");
1284     moveto(22, 1);
1285     prints(" ------------------------------------------------------------------------------ ");
1286     moveto(23, 1);
1287     prints(" [\033[1;32mCtrl+C\033[m]退出");
1288 sysadm 1.13
1289 sysadm 1.14 iflush();
1290 sysadm 1.1
1291 sysadm 1.14 return 0;
1292 sysadm 1.1 }
1293    
1294 sysadm 1.74 static int bbsnet_selchange()
1295 sysadm 1.1 {
1296 sysadm 1.43 int i = bbsnet_menu.menu_item_pos[0];
1297    
1298 sysadm 1.84 moveto(20, 1);
1299 sysadm 1.14 clrtoeol();
1300 sysadm 1.87 prints("|\033[1m单位: \033[1;33m%s\033[m%*s 站名: \033[1;33m%s\033[m%*s 类型: \033[1;33m%s\033[m",
1301     bbsnet_conf[i].org_name, 20 - str_length(bbsnet_conf[i].org_name, 1), "",
1302     bbsnet_conf[i].site_name, 20 - str_length(bbsnet_conf[i].site_name, 1), "",
1303     (bbsnet_conf[i].use_ssh ? "SSH" : "Telnet"));
1304 sysadm 1.84 moveto(20, 80);
1305 sysadm 1.23 prints("|");
1306 sysadm 1.84 moveto(21, 1);
1307 sysadm 1.14 clrtoeol();
1308 sysadm 1.87 prints("|\033[1m连往: \033[1;33m%-20s\033[m 端口: \033[1;33m%-5d\033[m 编码: \033[1;33m%s\033[m",
1309     bbsnet_conf[i].host_name, bbsnet_conf[i].port, bbsnet_conf[i].charset);
1310 sysadm 1.84 moveto(21, 80);
1311 sysadm 1.23 prints("|");
1312 sysadm 1.14 iflush();
1313 sysadm 1.1
1314 sysadm 1.14 return 0;
1315 sysadm 1.1 }
1316    
1317 sysadm 1.83 int bbs_net()
1318 sysadm 1.1 {
1319 sysadm 1.43 int ch, i;
1320 sysadm 1.1
1321 sysadm 1.89 if (load_bbsnet_conf(CONF_BBSNET) < 0)
1322     {
1323     clearscr();
1324     moveto(1, 1);
1325     prints("加载穿梭配置失败!");
1326     press_any_key();
1327     return -1;
1328     }
1329 sysadm 1.1
1330 sysadm 1.14 bbsnet_refresh();
1331 sysadm 1.41 display_menu(&bbsnet_menu);
1332 sysadm 1.43 bbsnet_selchange();
1333 sysadm 1.14
1334 sysadm 1.26 while (!SYS_server_exit)
1335 sysadm 1.1 {
1336 sysadm 1.39 ch = igetch(100);
1337 sysadm 1.52
1338 sysadm 1.71 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
1339     {
1340     BBS_last_access_tm = time(NULL);
1341     }
1342 sysadm 1.64
1343 sysadm 1.14 switch (ch)
1344     {
1345 sysadm 1.47 case KEY_NULL: // broken pipe
1346 sysadm 1.91 #ifdef _DEBUG
1347 sysadm 1.64 log_error("KEY_NULL\n");
1348 sysadm 1.91 #endif
1349 sysadm 1.40 goto cleanup;
1350 sysadm 1.14 case KEY_TIMEOUT:
1351 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
1352 sysadm 1.14 {
1353 sysadm 1.64 log_error("User input timeout\n");
1354 sysadm 1.40 goto cleanup;
1355 sysadm 1.14 }
1356 sysadm 1.29 continue;
1357 sysadm 1.64 case KEY_ESC:
1358     case Ctrl('C'): // user cancel
1359     goto cleanup;
1360 sysadm 1.14 case CR:
1361 sysadm 1.43 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
1362 sysadm 1.84 // Force cleanup anything remaining in the output buffer
1363     clearscr();
1364     iflush();
1365     // Clear screen and redraw menu
1366 sysadm 1.14 bbsnet_refresh();
1367 sysadm 1.41 display_menu(&bbsnet_menu);
1368 sysadm 1.43 bbsnet_selchange();
1369 sysadm 1.14 break;
1370     case KEY_UP:
1371     for (i = 0; i < STATION_PER_LINE; i++)
1372 sysadm 1.20 {
1373 sysadm 1.14 menu_control(&bbsnet_menu, KEY_UP);
1374 sysadm 1.20 }
1375 sysadm 1.43 bbsnet_selchange();
1376 sysadm 1.14 break;
1377     case KEY_DOWN:
1378     for (i = 0; i < STATION_PER_LINE; i++)
1379 sysadm 1.20 {
1380 sysadm 1.14 menu_control(&bbsnet_menu, KEY_DOWN);
1381 sysadm 1.20 }
1382 sysadm 1.43 bbsnet_selchange();
1383 sysadm 1.14 break;
1384     case KEY_LEFT:
1385     menu_control(&bbsnet_menu, KEY_UP);
1386 sysadm 1.43 bbsnet_selchange();
1387 sysadm 1.14 break;
1388     case KEY_RIGHT:
1389     menu_control(&bbsnet_menu, KEY_DOWN);
1390 sysadm 1.43 bbsnet_selchange();
1391     break;
1392 sysadm 1.44 case KEY_HOME:
1393 sysadm 1.43 case KEY_PGUP:
1394     menu_control(&bbsnet_menu, KEY_PGUP);
1395     bbsnet_selchange();
1396 sysadm 1.14 break;
1397 sysadm 1.44 case KEY_END:
1398     case KEY_PGDN:
1399     menu_control(&bbsnet_menu, KEY_PGDN);
1400     bbsnet_selchange();
1401     break;
1402 sysadm 1.14 default:
1403     menu_control(&bbsnet_menu, ch);
1404 sysadm 1.43 bbsnet_selchange();
1405 sysadm 1.14 break;
1406     }
1407 sysadm 1.1 }
1408    
1409 sysadm 1.40 cleanup:
1410     unload_bbsnet_conf();
1411    
1412 sysadm 1.14 return 0;
1413 sysadm 1.1 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1